I need a copy of this to compare to the other versions. I suspect that it fixes the recently discovered serious security loophole in 5.1.0 that allowed executing arbitrary code on a kindle touch by visiting a WEB PAGE, which was reported to amazon.

We need to see how this affects our jailbreaks and hacks. We also need to check the main and diags kernels and partitions on this new kindle.

See if the diags menu still works. Create an ENABLE_DIAGS file on the USB drive (no file extension, so unless you have windows explorer configured to show file extensions, use a command prompt to create this file). Then reboot. If you see a diags menu, you can exit back to main from the exit menu (disable diagnostics).

Great. It should be safe to try the data.tar.gz and RUNME.sh (with ENABLE_DIAGS) from the "select boot" thread, if you want to. That will tell us if the existing jailbreak method will work. It is linked in the references section of the "simple debricking" sticky first post.

Hopefully, they just fixed the bug that we reported and did not lock down the device. I plan to install the 5.1.1 and new diags partitions and kernels on my kindle to test it...

I can always downgrade to older versions using the simple debricking method.

Oh jeez... I'm glad (??) I have the Wifi turned off right now. I'm probably not going to update until I get the new jbpatch version out and verified it to work with a 5.1.0 backend.

That said: has the remote root vulnerability been fixed? (I hope so). Then, @geekmaster, NiLuJe: is the current jailbreak method still working? (Sorry for not being able to investigate this by myself right now... as said, I'll stick with 5.1.0 because I have to get jbpatch straight.)